Exam Logo

Comptia (CAS-003) Exam Questions And Answers page 3

Ann, a user, brings her laptop to an analyst after noticing it has been operating very slowly. The security analyst examines the laptop and obtains the following output:


Which of the following will the analyst most likely use NEXT?
Risk Management Enterprise Security Operations
An organization is concerned that its hosted web servers are not running the most updated version of software. Which of the following would work BEST to help identify potential vulnerabilities?
Risk Management Enterprise Security Operations
A large enterprise with thousands of users is experiencing a relatively high frequency of malicious activity from the insider threats. Much of the activity appears to involve internal reconnaissance that results in targeted attacks against privileged users and network file shares. Given this scenario, which of the following would MOST likely prevent or deter these attacks? (Choose two.)
Risk Management Enterprise Security Operations
A small company is implementing a new technology that promises greater performance but does not abide by accepted RFCs. Which of the following should the company do to ensure the risks associated with implementing the standard-violating technology are addressed?
Risk Management Risk Management
Given the following output from a local PC:

Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website?
Enterprise Security Architecture Enterprise Security Operations
A large, public university has recently been experiencing an increase in ransomware attacks against computers connected to its network. Security engineers have discovered various staff members receiving seemingly innocuous files in their email that are being run. Which of the following would BEST mitigate this attack method?
Risk Management Enterprise Security Operations
A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (!IO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor must specialize in hosting large databases in the cloud. Which of the following cloud-hosting options would BEST meet these needs?
Risk Management Enterprise Security Operations
While standing up a proof-of-concept solution with a vendor, the following direction was given for connections to the different environments:


Which of the following is being used to secure the three environments from overlap if all of them reside on separate servers in the same DMZ?
Risk Management Enterprise Security Operations
After the departure of a developer under unpleasant circumstances, the company is concerned about the security of the software to which the developer has access. Which of the following is the BEST way to ensure security of the code following the incident?
Risk Management Enterprise Security Operations
A network engineer is attempting to design-in resiliency characteristics for an enterprise network s VPN services.

If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?
Risk Management Enterprise Security Operations